General

  • Target

    d2c141b7ff45d200f6dfcbd93c4fef12_JaffaCakes118

  • Size

    2.2MB

  • Sample

    240907-y2a8nasfln

  • MD5

    d2c141b7ff45d200f6dfcbd93c4fef12

  • SHA1

    9438bc8f9085593581a35ada141e7b717f76e810

  • SHA256

    f5fea1924957de973880875e9a7666d38978bafdcae71f8ff7d276b21a75f468

  • SHA512

    51c1bf6703d31d2344719ec1cc0867ee03dd8f2ef5062fbce6bb221c27421ac38d3672345c5ec90c8b40aee3c676a422ce694c991402107133909440db1568d6

  • SSDEEP

    24576:0UzNkyrbtjbGixCOPKH2I1iIWILtfOIJ+HKodCHPC0cF3u7P1+eWQ8f/x52vHNZM:0UzeyQMS4DqodCnoe+iitjWwwI

Malware Config

Extracted

Family

pony

C2

http://don.service-master.eu/gate.php

Attributes
  • payload_url

    http://don.service-master.eu/shit.exe

Targets

    • Target

      d2c141b7ff45d200f6dfcbd93c4fef12_JaffaCakes118

    • Size

      2.2MB

    • MD5

      d2c141b7ff45d200f6dfcbd93c4fef12

    • SHA1

      9438bc8f9085593581a35ada141e7b717f76e810

    • SHA256

      f5fea1924957de973880875e9a7666d38978bafdcae71f8ff7d276b21a75f468

    • SHA512

      51c1bf6703d31d2344719ec1cc0867ee03dd8f2ef5062fbce6bb221c27421ac38d3672345c5ec90c8b40aee3c676a422ce694c991402107133909440db1568d6

    • SSDEEP

      24576:0UzNkyrbtjbGixCOPKH2I1iIWILtfOIJ+HKodCHPC0cF3u7P1+eWQ8f/x52vHNZM:0UzeyQMS4DqodCnoe+iitjWwwI

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks